Search Results - (( development sdn function algorithm ) OR ( java application force algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Performance analysis of Software Defined Network (SDN) in link failure scenario by R.Badlishah, Ahmad, Sakari, M.A.I.M, Yaakob, N, Amir, A, Warip, M.N.M., Ibrahim, Z.

    Published 2019
    “…As SDN is developed to handle largescale network, addressing network dynamics such as link failure remains challenging. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Performance analysis of Software Defined Network (SDN) in link failure scenario by Badlishah, Ahmad, Sakari, M.A.I.M, Yaakob, N, Amir, A, Mohd Warip, M.N, Ibrahim, Z.

    Published 2019
    “…As SDN is developed to handle largescale network, addressing network dynamics such as link failure remains challenging. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  5. 5

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…To preserve the correct functioning of the entire SDN architecture, an efficient detection of various distributed coordinated attacks and anomalies triggered by large-scale malicious events that predominantly target the control plane is of paramount concern and an increasingly important research topic. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The developed methods are successfully tested on IEEE standard systems and the Sabah Electricy Sdn. …”
    Get full text
    Get full text
    Thesis